PENERAPAN METODE NIJ UNTUK ANALISIS SERANGAN DOS PADA PERANGKAT IOT

Singgih Mitro S, Dadan Sukma

Abstract


One of the problems of IoT is because many devices are connected to IoT in the industrial era 4.0, which ultimately distracts hackers from solving security mechanisms. One of the security factors of concern in this IoT device is a Denial of Service (DoS) attack on the Internet of Things (IoT) device network which results in a system being flooded with data continuously in a short time resulting in very dense network traffic. resulting in IoT device down. This study aims to apply the National Institute of Justice (NIJ) method in analyzing Denial of Service (DOS) attacks on Internet of Things (IoT) devices. The NIJ method includes stages such as preparation, incident handling, collection identification, collection, examination, analysis, reporting. The results of the study show that the NIJ method can be used to analyze DoS attacks on IoT devices and assist in taking action to prevent further attacks.

Full Text:

References


K. Hengst, “DDoS through the Internet of Things,” 25th twente student conference on IT, 2016.

C. Zhang and R. Green, “Communication Security in Internet of Thing: Preventive Measure and Avoid DDoS Attack over IoT Network,” Proceedings of the 18th Symposium on Communications & Networking, no. May, pp. 8–15, 2015.

A. R. Caesarano and I. Riadi, “Network Forensics for Detecting SQL Injection Attacks using NIST Method,” International Journal of Cyber-Security and Digital Forensics (IJCSDF), vol. 7, no. 4, pp. 436–443, 2018.

M. Alim, I. Riadi, and Y. Prayudi, “Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard,” Int J Comput Appl, vol. 180, no. 35, pp. 23–30, 2018, doi: 10.5120/ijca2018916879.

S. Zawoad and R. Hasan, “FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things,” Proceedings - 2015 IEEE International Conference on Services Computing, SCC 2015, pp. 279–284, 2015, doi: 10.1109/SCC.2015.46.

B. Paharia, “DDoS Detection and Mitigation in cloud via FogFiter : a defence mechanism,” 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–7, 2018.

I. Riadi, R. Umar, and I. M. Nasrulloh, “ANALISIS FORENSIK DIGITAL PADA FROZEN SOLID STATE DRIVE DENGAN METODE NATIONAL INSTITUTE OF JUSTICE (NIJ),” Elinvo (Electronics, Informatics, and Vocational Education), vol. 3, no. 1, pp. 70–82, Jul. 2018, doi: 10.21831/elinvo.v3i1.19308.




DOI: https://doi.org/10.30591/polektro.v12i2.5093

DOI (PDF (Bahasa Indonesia)): https://doi.org/10.30591/polektro.v12i2.5093.g2368

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

----------------------------------------------------------------------------------------------------------------------

Indexed By :

 

 

 

 

----------------------------------------------------------------------------------------------------------------------

Tim Redaksi POWER ELEKTRONIK : JURNAL ORANG ELEKTRO

Program Studi D3 Teknik Elektro
Politeknik Harapan Bersama Tegal
Jl. Mataram No.09 Pesurungan Lor Kota Tegal

Telp. (0283) 350567

Email :
powerelektronik.ejournal@poltektegal.ac.id

 

Free counters!

View Visitor Statistic

 

Power Elektronik : Journal Orang Elektro licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.